Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /30 /29 /27 /28 /30 /29 /27 /28 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 only 3 and 4 1, 3 and 4 1 only 3 only 3 and 4 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet 1, 2 and 3 1 and 4 All of these 3, 4, and 5 1, 2 and 3 1 and 4 All of these 3, 4, and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of bounded medium? Coaxial cable None of these Wave guide All of these Coaxial cable None of these Wave guide All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length. m - 1 (2m - l)/mJ 2 (m - 2) 2 (2m - 1) m - 1 (2m - l)/mJ 2 (m - 2) 2 (2m - 1) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a router to respond to an ARP request that is intended for a remote host? Reverse ARP (RARP) Gateway DP Proxy ARP Inverse ARP (IARP) Reverse ARP (RARP) Gateway DP Proxy ARP Inverse ARP (IARP) ANSWER DOWNLOAD EXAMIANS APP